C:\sitag\kirominazi_memuyisamuh\mobuv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
87c82650c188902521112ce244a38f8f67c468a28a981a2aa1ea0c915edc0458.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
87c82650c188902521112ce244a38f8f67c468a28a981a2aa1ea0c915edc0458.exe
Resource
win10v2004-20241007-en
General
-
Target
87c82650c188902521112ce244a38f8f67c468a28a981a2aa1ea0c915edc0458
-
Size
441KB
-
MD5
7b1a4451ed835b4e956b85d1600edcd2
-
SHA1
842ad9ef11ec7826453486c93c9a31cabd9e6c8f
-
SHA256
87c82650c188902521112ce244a38f8f67c468a28a981a2aa1ea0c915edc0458
-
SHA512
8c2164d4bde4af7c0371f2f1c9c6899b517ae80ce0c5f4bb1ee94b8f47f52bbfc4fd15143db549d1b7f6655c5add534991ef417bc56a81a288c4e81488460618
-
SSDEEP
6144:pWRvYkImF8hmIaBp5fv0WeTkJ0+W/l2LeFV9jz67Quc:uc45hX0VTklIl2LGn60uc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87c82650c188902521112ce244a38f8f67c468a28a981a2aa1ea0c915edc0458
Files
-
87c82650c188902521112ce244a38f8f67c468a28a981a2aa1ea0c915edc0458.exe windows:5 windows x86 arch:x86
8aff45b68d3f12f20fc26cca6f6a8508
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeA
WaitForSingleObject
GetNamedPipeHandleStateW
CreateNamedPipeW
CallNamedPipeA
TerminateThread
FatalExit
GetVersionExA
GetConsoleAliasesLengthA
SetConsoleCP
VerifyVersionInfoA
VerLanguageNameA
FindFirstFileExA
FreeEnvironmentStringsW
GetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameW
CopyFileW
TlsSetValue
VerifyVersionInfoW
GetConsoleCursorInfo
TzSpecificLocalTimeToSystemTime
GetProcessShutdownParameters
ReleaseSemaphore
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
LocalAlloc
SleepEx
TlsGetValue
MoveFileW
GetCommandLineW
InterlockedDecrement
DeleteFileA
CreateActCtxW
SetFileAttributesW
GetPrivateProfileIntW
HeapValidate
GetProcessHeaps
CreateNamedPipeA
WriteConsoleOutputW
GetStartupInfoA
GetDiskFreeSpaceExW
GetCPInfoExW
GetWindowsDirectoryW
GetSystemWow64DirectoryA
SetLastError
GetProfileStringA
GetCalendarInfoA
GetTickCount
GetSystemTime
DebugBreak
FindFirstFileA
WriteFileGather
ReadFile
GetNumberOfConsoleMouseButtons
GetSystemWow64DirectoryW
TerminateProcess
lstrcatW
CreateActCtxA
InitializeSListHead
InterlockedExchange
SetCriticalSectionSpinCount
DefineDosDeviceA
WriteConsoleW
HeapWalk
CreateIoCompletionPort
PeekConsoleInputW
GetNumberFormatW
GetQueuedCompletionStatus
FreeEnvironmentStringsA
SetLocalTime
FindResourceExW
CreateSemaphoreW
GetThreadLocale
SetFileShortNameA
lstrcpyW
ReplaceFileW
LockFile
MoveFileExW
GetConsoleCP
GetVolumePathNameA
SetConsoleScreenBufferSize
FreeConsole
GetConsoleAliasExesLengthW
WriteConsoleInputW
LocalShrink
SetCommState
GetSystemTimeAdjustment
EnumSystemLocalesW
GetNumaProcessorNode
SetEndOfFile
ChangeTimerQueueTimer
GetWriteWatch
RaiseException
OpenSemaphoreW
GetConsoleScreenBufferInfo
ClearCommError
ReleaseActCtx
GetLastError
GetComputerNameA
OpenMutexA
GetStringTypeA
VirtualUnlock
SetWaitableTimer
CreateTimerQueue
GetProcessTimes
IsBadWritePtr
FatalAppExitA
lstrcpynW
SetNamedPipeHandleState
FillConsoleOutputCharacterW
GetCompressedFileSizeW
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringA
LockFileEx
LeaveCriticalSection
SetCurrentDirectoryA
GlobalAddAtomW
ReadFileEx
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
IsBadReadPtr
IsProcessorFeaturePresent
TlsAlloc
GetCurrentThreadId
TlsFree
GetModuleHandleW
InterlockedIncrement
ExitProcess
WriteFile
GetStdHandle
EnterCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
HeapCreate
SetFilePointer
WideCharToMultiByte
GetConsoleMode
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
RtlUnwind
SetStdHandle
GetStringTypeW
LCMapStringW
FlushFileBuffers
CreateFileW
CloseHandle
user32
OemToCharW
GetAltTabInfoA
Sections
.text Size: 349KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 558KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ